CVE-2009-1902 – ModSecurity < 2.5.9 - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2009-1902
The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference. El procesador multipart en ModSecurity anterior a v2.5.9, permite a atacantes remotos provocar una denegación de servicio (caída) a través de una petición multipart form datapost con un "part header name" perdido, lo que provoca una deferencia a puntero nulo (NULL). • https://www.exploit-db.com/exploits/8241 http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html http://secunia.com/advisories/34256 http://secunia.com/advisories/34311 http://secunia.com/advisories/35687 http://security.gentoo.org/glsa/glsa-200907-02.xml http://sourceforge.net/project/shownotes.php?release_id=667542&group_id=68846 http://www.osvdb.org/52553 http://www.securityfocus.com/archive/1/501968 http://www.securityfocus.com/bid/34096 http://www • CWE-476: NULL Pointer Dereference •
CVE-2009-1903
https://notcve.org/view.php?id=CVE-2009-1903
The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method. La funcionalidad de protección de PDF XSS en ModSecurity anterior a v2.5.8, permite a atacantes remotos provocar una denegación de servicio (caída del httpd Apacche) a través de una petición a un archivo PDF que no emplea el método GET. • http://secunia.com/advisories/34256 http://secunia.com/advisories/34311 http://secunia.com/advisories/35687 http://security.gentoo.org/glsa/glsa-200907-02.xml http://sourceforge.net/project/shownotes.php?release_id=667538 http://www.osvdb.org/52552 http://www.securityfocus.com/bid/34096 http://www.vupen.com/english/advisories/2009/0703 https://exchange.xforce.ibmcloud.com/vulnerabilities/49211 https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html https:/ •